메뉴 건너뛰기




Volumn 47, Issue 11-12, 2008, Pages 1238-1245

Efficient password authenticated key agreement using bilinear pairings

Author keywords

Bilinear pairings; Identity protection; Session key agreement; Smart cards; User authentication

Indexed keywords

DATA PRIVACY; PROBLEM SOLVING; SERVERS; SMART CARDS; USER INTERFACES; VERIFICATION;

EID: 43049128557     PISSN: 08957177     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.mcm.2007.08.001     Document Type: Article
Times cited : (30)

References (20)
  • 1
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • Lamport L. Password authentication with insecure communication. Communications of ACM 24 (1981) 28-30
    • (1981) Communications of ACM , vol.24 , pp. 28-30
    • Lamport, L.1
  • 2
    • 0032137355 scopus 로고    scopus 로고
    • A password authentication method for contents communication on the Internet
    • Shimizu A., Horioka T., and Inagaki H. A password authentication method for contents communication on the Internet. IEICE Transactions on Communications E81-B 8 (1998) 1666-1673
    • (1998) IEICE Transactions on Communications , vol.E81-B , Issue.8 , pp. 1666-1673
    • Shimizu, A.1    Horioka, T.2    Inagaki, H.3
  • 3
    • 28044451335 scopus 로고    scopus 로고
    • Robust remote authentication scheme with smart cards
    • Fan C., Chan Y., and Zhang Z. Robust remote authentication scheme with smart cards. Computers & Security 24 (2005) 619-628
    • (2005) Computers & Security , vol.24 , pp. 619-628
    • Fan, C.1    Chan, Y.2    Zhang, Z.3
  • 4
    • 1542335451 scopus 로고    scopus 로고
    • Efficient password authenticated key agreement using smart card
    • Juang W. Efficient password authenticated key agreement using smart card. Computer & Security 23 (2004) 167-173
    • (2004) Computer & Security , vol.23 , pp. 167-173
    • Juang, W.1
  • 5
    • 1942423677 scopus 로고    scopus 로고
    • Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards
    • Ku W., and Chen S. Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics 50 1 (2004) 204-207
    • (2004) IEEE Transactions on Consumer Electronics , vol.50 , Issue.1 , pp. 204-207
    • Ku, W.1    Chen, S.2
  • 6
    • 0041698517 scopus 로고    scopus 로고
    • A remote user authentication scheme using hash functions
    • Lee C., Li L., and Hwang M. A remote user authentication scheme using hash functions. ACM Operating Systems Review 36 4 (2002) 23-29
    • (2002) ACM Operating Systems Review , vol.36 , Issue.4 , pp. 23-29
    • Lee, C.1    Li, L.2    Hwang, M.3
  • 7
    • 0033704170 scopus 로고    scopus 로고
    • Methods for protecting password transmission
    • Peyravian M., and Zunic N. Methods for protecting password transmission. Computers & Security 19 5 (2000) 466-469
    • (2000) Computers & Security , vol.19 , Issue.5 , pp. 466-469
    • Peyravian, M.1    Zunic, N.2
  • 8
    • 33744725812 scopus 로고    scopus 로고
    • A hash-based strong-password authentication scheme without using smart cards
    • Ku W. A hash-based strong-password authentication scheme without using smart cards. ACM Operating Systems Review 38 1 (2004) 29-34
    • (2004) ACM Operating Systems Review , vol.38 , Issue.1 , pp. 29-34
    • Ku, W.1
  • 9
    • 33744757940 scopus 로고    scopus 로고
    • Weaknesses of Lee-Li-Hwang's hash-based password authentication scheme
    • Ku W., Chen C., and Lee H. Weaknesses of Lee-Li-Hwang's hash-based password authentication scheme. ACM Operating Systems Review 37 4 (2003) 9-25
    • (2003) ACM Operating Systems Review , vol.37 , Issue.4 , pp. 9-25
    • Ku, W.1    Chen, C.2    Lee, H.3
  • 10
    • 21644467750 scopus 로고    scopus 로고
    • Provably secure three-party password-based authenticated key exchange protocol using Weil pairing
    • Wen H., Lee T., and Hwang T. Provably secure three-party password-based authenticated key exchange protocol using Weil pairing. IEE Proceedings of Communications 152 2 (2005) 138-143
    • (2005) IEE Proceedings of Communications , vol.152 , Issue.2 , pp. 138-143
    • Wen, H.1    Lee, T.2    Hwang, T.3
  • 11
    • 33744776672 scopus 로고    scopus 로고
    • A novel remote user authentication scheme using bilinear pairings
    • Das M., Saxena A., Gulati V., and Phatak D. A novel remote user authentication scheme using bilinear pairings. Computers & Security 25 3 (2006) 184-189
    • (2006) Computers & Security , vol.25 , Issue.3 , pp. 184-189
    • Das, M.1    Saxena, A.2    Gulati, V.3    Phatak, D.4
  • 12
    • 43049092163 scopus 로고    scopus 로고
    • J. Chou, Y. Chen, J. Lin, Improvement of Manik et al.'s remote user authentication scheme. http://eprint.iacr.org/2005/450.pdf
    • J. Chou, Y. Chen, J. Lin, Improvement of Manik et al.'s remote user authentication scheme. http://eprint.iacr.org/2005/450.pdf
  • 13
    • 43049091456 scopus 로고    scopus 로고
    • T. Goriparthi, Manik L. Das, A. Negi, A. Saxena, Cryptanalysis of recently proposed remote user authentication schemes. http://eprint.iacr.org/2006/028.pdf
    • T. Goriparthi, Manik L. Das, A. Negi, A. Saxena, Cryptanalysis of recently proposed remote user authentication schemes. http://eprint.iacr.org/2006/028.pdf
  • 14
    • 0033157651 scopus 로고    scopus 로고
    • An improvement of the password-based authentication protocol on security against replay attacks
    • Kwon T., Kang M., Juang S., and Song J. An improvement of the password-based authentication protocol on security against replay attacks. IEICE Transactions on Communications E82-B 7 (1999) 991-997
    • (1999) IEICE Transactions on Communications , vol.E82-B , Issue.7 , pp. 991-997
    • Kwon, T.1    Kang, M.2    Juang, S.3    Song, J.4
  • 15
    • 0142007776 scopus 로고    scopus 로고
    • Cryptanalysis of a variant of Peyravian-Zunic's password authentication scheme
    • Ku W., Chen C., and Lee H. Cryptanalysis of a variant of Peyravian-Zunic's password authentication scheme. IEICE Transactions on Communications E86-B 5 (2003) 1682-1684
    • (2003) IEICE Transactions on Communications , vol.E86-B , Issue.5 , pp. 1682-1684
    • Ku, W.1    Chen, C.2    Lee, H.3
  • 16
    • 0000873739 scopus 로고
    • Repairable key distribution protocols for internet environments
    • Hwang T., and Ku W. Repairable key distribution protocols for internet environments. IEEE Transactions on Communications 43 5 (1995) 1947-1950
    • (1995) IEEE Transactions on Communications , vol.43 , Issue.5 , pp. 1947-1950
    • Hwang, T.1    Ku, W.2
  • 17
    • 43049139427 scopus 로고    scopus 로고
    • NIST FIPS PUB 180-2, Secure Hash Standard, National Institute of Standards and Technology, U.S. Department of Commerce, DRAFT, 2004
    • NIST FIPS PUB 180-2, Secure Hash Standard, National Institute of Standards and Technology, U.S. Department of Commerce, DRAFT, 2004
  • 18
    • 43049137604 scopus 로고    scopus 로고
    • NIST FIPS PUB 197, Announcing the Advanced Encryption Standard (AES), National Institute of Standards and Technology, U.S. Department of Commerce, Nov. 2001
    • NIST FIPS PUB 197, Announcing the Advanced Encryption Standard (AES), National Institute of Standards and Technology, U.S. Department of Commerce, Nov. 2001
  • 19
    • 1842715081 scopus 로고    scopus 로고
    • The advantages of elliptic curve cryptography for wireless security
    • Lauter K. The advantages of elliptic curve cryptography for wireless security. IEEE Wireless Communications 11 (2004) 62-67
    • (2004) IEEE Wireless Communications , vol.11 , pp. 62-67
    • Lauter, K.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.